Tanium Threat Response¶
About¶
Tanium Threat Response eases the collaboration challenges faced by security and IT teams, providing an integrated view across your digital infrastructure.
Product Details¶
Vendor URL: Tanium Threat Response
Product Type: Endpoint Detection and Response
Product Tier: Tier I
Integration Method: Syslog
Integration URL: Tanium Connect
Log Guide: Tanium Threat Response Guide
Parser Details¶
Log Format: JSON
Expected Normalization Rate: 95%
Data Label: TANIUM_THREAT_RESPONSE
UDM Fields (list of all UDM fields leveraged in the Parser):
Log File Field | UDM Field |
---|---|
ComputerIP | principal.ip |
ComputerName | target.hostname |
domain | target.administrative_domain |
finding.artifact.windows_defender_event.event.exploit_guard_blocked.id | metadata.product_log_id |
finding.artifact.windows_defender_event.event.exploit_guard_blocked.path | principal.process.command_line |
finding.artifact.windows_defender_event.event.exploit_guard_blocked.path | security_result.about.file.full_path |
finding.artifact.windows_defender_event.event.exploit_guard_blocked.process_name | principal.process.file.full_path |
finding.artifact.windows_defender_event.event.malware_action_v2.action_type | security_result.action_details |
finding.artifact.windows_defender_event.event.malware_action_v2.additional_actions | security_result.description |
finding.artifact.windows_defender_event.event.malware_action_v2.category_name | security_result.category_details |
finding.artifact.windows_defender_event.event.malware_action_v2.detection_id | security_result.rule_id |
finding.artifact.windows_defender_event.event.malware_action_v2.detection_source | security_result.threat_feed_name |
finding.artifact.windows_defender_event.event.malware_action_v2.error_description | metadata.description |
finding.artifact.windows_defender_event.event.malware_action_v2.path | principal.process.command_line |
finding.artifact.windows_defender_event.event.malware_action_v2.path | security_result.about.file.full_path |
finding.artifact.windows_defender_event.event.malware_action_v2.severity_name | security_result.severity |
finding.artifact.windows_defender_event.event.malware_action_v2.severity_name | security_result.severity_details |
finding.artifact.windows_defender_event.event.malware_action_v2.threat_id | security_result.threat_id |
finding.artifact.windows_defender_event.event.malware_action_v2.threat_name | security_result.threat_name |
finding.artifact.windows_defender_event.event.malware_detection_v2.action_type | security_result.action_details |
finding.artifact.windows_defender_event.event.malware_detection_v2.additional_actions | security_result.description |
finding.artifact.windows_defender_event.event.malware_detection_v2.category_name | security_result.category_details |
finding.artifact.windows_defender_event.event.malware_detection_v2.detection_id | security_result.rule_id |
finding.artifact.windows_defender_event.event.malware_detection_v2.detection_source | security_result.threat_feed_name |
finding.artifact.windows_defender_event.event.malware_detection_v2.error_description | metadata.description |
finding.artifact.windows_defender_event.event.malware_detection_v2.path | principal.process.command_line |
finding.artifact.windows_defender_event.event.malware_detection_v2.path | security_result.about.file.full_path |
finding.artifact.windows_defender_event.event.malware_detection_v2.severity_name | security_result.severity |
finding.artifact.windows_defender_event.event.malware_detection_v2.severity_name | security_result.severity_details |
finding.artifact.windows_defender_event.event.malware_detection_v2.threat_id | security_result.threat_id |
finding.artifact.windows_defender_event.event.malware_detection_v2.threat_name | security_result.threat_name |
finding.artifact.windows_defender_event.event.unwanted_application_detected.action_type | security_result.action_details |
finding.artifact.windows_defender_event.event.unwanted_application_detected.additional_actions | security_result.description |
finding.artifact.windows_defender_event.event.unwanted_application_detected.category_name | security_result.category_details |
finding.artifact.windows_defender_event.event.unwanted_application_detected.detection_id | security_result.rule_id |
finding.artifact.windows_defender_event.event.unwanted_application_detected.detection_source | security_result.threat_feed_name |
finding.artifact.windows_defender_event.event.unwanted_application_detected.error_description | metadata.description |
finding.artifact.windows_defender_event.event.unwanted_application_detected.path | principal.process.command_line |
finding.artifact.windows_defender_event.event.unwanted_application_detected.path | security_result.about.file.full_path |
finding.artifact.windows_defender_event.event.unwanted_application_detected.process_name | principal.process.file.full_path |
finding.artifact.windows_defender_event.event.unwanted_application_detected.severity_name | security_result.severity |
finding.artifact.windows_defender_event.event.unwanted_application_detected.severity_name | security_result.severity_details |
finding.artifact.windows_defender_event.event.unwanted_application_detected.threat_id | security_result.threat_id |
finding.artifact.windows_defender_event.event.unwanted_application_detected.threat_name | security_result.threat_name |
IntelId | security_result.rule_id |
IntelLabels | security_result.description |
IntelName | metadata.product_event_type |
IntelName | security_result.summary |
IntelName | security_result.threat_name |
IntelType | security_result.rule_type |
MatchDetails.match.contexts.0.event.registrySet.keyPath | target.registry.registry_key |
MatchDetails.match.contexts.0.event.registrySet.valueName | target.registry.registry_value_name |
MatchDetails.match.properties.args | security_result.about.process.command_line |
MatchDetails.match.properties.file.fullpath | target.process.file.full_path |
MatchDetails.match.properties.file.md5 | target.process.file.md5 |
MatchDetails.match.properties.file.sha1 | target.process.file.sha1 |
MatchDetails.match.properties.file.sha256 | target.process.file.sha256 |
MatchDetails.match.properties.fullpath | target.process.file.full_path |
MatchDetails.match.properties.local_port | principal.port |
MatchDetails.match.properties.md5 | target.process.file.md5 |
MatchDetails.match.properties.parent.args | security_result.about.process.command_line |
MatchDetails.match.properties.parent.file.fullpath | target.process.parent_process.file.full_path |
MatchDetails.match.properties.parent.file.md5 | target.process.parent_process.file.md5 |
MatchDetails.match.properties.parent.parent.file.fullpath | target.process.parent_process.parent_process.file.full_path |
MatchDetails.match.properties.parent.parent.file.md5 | target.process.parent_process.parent_process.file.md5 |
MatchDetails.match.properties.parent.parent.parent.file.fullpath | target.process.parent_process.parent_process.parent_process.file.full_path |
MatchDetails.match.properties.parent.parent.parent.file.md5 | target.process.parent_process.parent_process.parent_process.file.md5 |
MatchDetails.match.properties.parent.parent.parent.parent.file.fullpath | target.process.parent_process.parent_process.parent_process.parent_process.file.full_path |
MatchDetails.match.properties.parent.parent.parent.parent.file.md5 | target.process.parent_process.parent_process.parent_process.parent_process.file.md5 |
MatchDetails.match.properties.parent.parent.parent.parent.parent.file.fullpath | target.process.parent_process.parent_process.parent_process.parent_process.parent_process.file.full_path |
MatchDetails.match.properties.parent.parent.parent.parent.parent.file.md5 | target.process.parent_process.parent_process.parent_process.parent_process.parent_process.file.md5 |
MatchDetails.match.properties.parent.parent.parent.parent.parent.pid | target.process.parent_process.parent_process.parent_process.parent_process.parent_process.pid |
MatchDetails.match.properties.parent.parent.parent.parent.pid | target.process.parent_process.parent_process.parent_process.parent_process.pid |
MatchDetails.match.properties.parent.parent.parent.pid | target.process.parent_process.parent_process.parent_process.pid |
MatchDetails.match.properties.parent.parent.pid | target.process.parent_process.parent_process.pid |
MatchDetails.match.properties.parent.pid | target.process.parent_process.pid |
MatchDetails.match.properties.pid | target.process.pid |
MatchDetails.match.properties.ppid | target.process.parent_pid |
MatchDetails.match.properties.protocol | network.ip_protocol |
MatchDetails.match.properties.remote_ip | target.ip |
MatchDetails.match.properties.remote_port | target.port |
MatchDetails.match.properties.sha1 | target.process.file.sha1 |
MatchDetails.match.properties.sha256 | target.process.file.sha256 |
MITRE Techniques | security_result.threat_id |
os | principal.platform_version |
patch_level | principal.platform_patch_level |
platform | principal.platform |
product_name | metadata.product_name |
user | principal.user.userid |
username | target.user.userid |
vendor_name | metadata.vendor_name |
windows_event_type | security_result.description |
Product Event Types¶
IntelName | UDM Event Type | Security Result Category | alerting |
---|---|---|---|
all events | SCAN_HOST | TRUE | |
Malicious | SOFTWARE_MALICIOUS | ||
Suspicious | SOFTWARE_MALICIOUS | ||
Uncommon | SOFTWARE_MALICIOUS |
Log Sample¶
2022-03-03T09:25:03-08:00 10.0.0.4 {"Alert Id":"sa12q555s-askqi9231","Timestamp":"2022-03-03T17:24:07.000Z","Computer Name":"Hostname1","Computer IP":"10.0.0.12","Intel Id":1206,"Intel Type":"defender","Intel Name":"Defender Intel","Intel Labels":"","Match Details":{"service_id":"193857591-195860021","finding":{"intel_id":"1206","hunt_id":"5","threat_id":"Exploit Guard","source_name":"windows_defender","domain.com_info":{"os":"Microsoft Windows Server 2019 Standard","build_number":"17763","patch_level":"10.0.17763.0.0","bits":64,"platform":"Windows"},"artifact":{"instance_hash":"19485860001","artifact_hash":"19485860001","windows_defender_event":{"timestamp_ms":"1646328239359","event":{"exploit_guard_blocked":{"id":"LQ173457-XNMMW56","detection_time":"2022-03-03T17:24:00.908Z","user":"johndoe\\domain.com","path":"C:\\Windows\\domain.com32\\lsass.exe","process_name":"C:\\Program Files\\dynatrace\\oneagent\\agent\\lib64\\oneagentplugin.exe"}}}},"first_seen":"2022-03-03T17:24:06.854539Z","last_seen":"2022-03-03T17:24:06.854539Z","whats":[{"source_name":"windows_defender","artifact_activity":{"acting_artifact":{"process":{"file":{"file":{"path":"C:\\Program Files\\dynatrace\\oneagent\\agent\\lib64\\oneagentplugin.exe"}},"user":{"user":{"name":"johndoe","domain":"domain.com"}}}},"relevant_actions":[{"target":{"file":{"path":"C:\\Windows\\SYSTEM32\\lsass.exe"}},"timestamp":"2022-03-03T17:23:59.359Z"}]},"security_event":{"timestamp":"2022-03-03T17:23:59.359Z","type_identifier":"1121"},"additional_fields":{"id":"LQ173457-XNMMW56","detection_time":"2022-03-03T17:24:00.908Z"}}],"description":"Exploit Guard"}},"Question":"Tanium Threat Response Alerts"}
Sample Parsing¶
metadata.event_timestamp = "2022-03-03T17:24:07Z"
metadata.event_type = "SCAN_HOST"
metadata.vendor_name = "Tanium"
metadata.product_name = "Threat Response"
metadata.product_event_type = "Defender Intel"
metadata.ingested_timestamp = "2022-03-03T17:31:09.956043Z"
principal.user.userid = "johndoe\\domain.com"
principal.process.file.full_path = "C:\Program Files\dynatrace\oneagent\agent\lib64\oneagentplugin.exe"
principal.process.command_line = "C:\Windows\domain.com32\lsass.exe"
principal.platform = "WINDOWS"
principal.ip = "10.0.0.12"
principal.platform_version = "Microsoft Windows Server 2019 Standard"
principal.platform_patch_level = "10.0.17763.0.0"
target.hostname = "Hostname1"
observer.ip = "10.0.0.4"
security_result.about.file.full_path = "C:\Windows\domain.com32\lsass.exe"
security_result.threat_name = "Defender Intel"
security_result.summary = "Defender Intel"
security_result.description = "exploit_guard_blocked"
security_result.severity = "HIGH"
security_result.confidence = "LOW_CONFIDENCE"
security_result.priority = "HIGH_PRIORITY"
security_result.rule_id = "1206"
security_result.alert_state = "ALERTING"
security_result.rule_type = "defender"
Parser Alerting¶
Alerting criteria is listed in the Product Event Types table above.
Rules¶
Coming soon